Skip to content

Path conversion in git bash #702

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
rcdailey opened this issue Mar 22, 2016 · 3 comments
Closed

Path conversion in git bash #702

rcdailey opened this issue Mar 22, 2016 · 3 comments
Labels

Comments

@rcdailey
Copy link

I'm running git version 2.7.4. I run the following command:

$ adb push "C:/System/settings" "/data/settings"

For some reason, the terminal/shell is converting "/data/settings" to "C:/Git/data/settings". I have git installed at "C:/Git".

I understand in most cases, this conversion makes sense. However in this context, "/data/settings" is a path on a REMOTE device, not the current filesystem. Is there a way to tell it not to convert the path?

@davidovich
Copy link

Double the slash on the path to escape msys path conversion:

adb push "C:/System/settings" "//data/settings"

@dscho dscho added the question label Mar 23, 2016
@dscho
Copy link
Member

dscho commented Mar 23, 2016

Please use the bug tracker only for bugs, not for questions. See https://git-scm.com/community for resources how to obtain help with using Git for Windows.

@dscho dscho closed this as completed Mar 23, 2016
@rcdailey

This comment was marked as abuse.

dscho added a commit to dscho/git that referenced this issue Oct 28, 2024
Instead of storing the Personal Access Token in an environment secret,
store it in Azure KeyVault instead. This allows for much better auditing
when (and where) the secret is used.

Ideally, we would even switch away from using a Personal Access Token in
the first place. But there is no alternative, such as a Managed Identity
on GitHub, where one could define in a fine-grained way which usage
scenario can be performed using that identity, and recent reorgs at
GitHub suggest that adding such an alternative may not be on the list of
priorities at all.

So let's just stay with a Personal Access Token, but do safeguard it
better by putting it into a KeyVault that can only be accessed by a
narrowly-scoped GitHub Actions environment.
dscho added a commit to dscho/git that referenced this issue Dec 10, 2024
)

This is a companion to git-for-windows#702: Instead of storing the token used for the
Homebrew release workflow, let's retrieve it from the Key Vault that
already is used to store such information.
mjcheetham pushed a commit to mjcheetham/git that referenced this issue Jan 20, 2025
Instead of storing the Personal Access Token in an environment secret,
store it in Azure KeyVault instead. This allows for much better auditing
when (and where) the secret is used.

Ideally, we would even switch away from using a Personal Access Token in
the first place. But there is no alternative, such as a Managed Identity
on GitHub, where one could define in a fine-grained way which usage
scenario can be performed using that identity, and recent reorgs at
GitHub suggest that adding such an alternative may not be on the list of
priorities at all.

So let's just stay with a Personal Access Token, but do safeguard it
better by putting it into a KeyVault that can only be accessed by a
narrowly-scoped GitHub Actions environment.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants